Mythic is a collaborative, multi-platform, red teaming framework that enables users to simulate attacks and test their defenses. It provides a flexible and customizable platform for red teaming, allowing users to create and manage their own attacks, and collaborate with others in real-time. Mythic supports multiple platforms, including Windows, Linux, and macOS, and provides a range of features such as payload generation, command and control, and post-exploitation capabilities. The framework is designed to be highly customizable, allowing users to create their own plugins and modules to extend its functionality. Additionally, Mythic provides a web-based interface for easy management and collaboration. Overall, Mythic is a powerful tool for red teaming and penetration testing, providing a flexible and customizable platform for simulating attacks and testing defenses.
FEATURES
SIMILAR TOOLS
SharpPrinter enables efficient discovery of network printers for security and management purposes.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.
Generates randomized C2 profiles for Cobalt Strike to evade detection.
Interactive online malware sandbox for real-time analysis and threat intelligence
A digital archive of the internet, allowing users to capture and browse archived web pages.
Tool for enumerating proxy configurations and generating CobaltStrike-compatible shellcode.
SharpShares efficiently enumerates and maps network shares and resolves names within a domain.
Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.
A suite of tools for Wi-Fi network security assessment and penetration testing.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.